{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:21Z","timestamp":1750306101586,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3132114.3132125","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"81-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mining Historical Data towards Interference Management in Wireless SDNs"],"prefix":"10.1145","author":[{"given":"Maryam","family":"Karimi","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Prashant","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"James","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"David","family":"Tipper","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"e_1_3_2_1_2_1","unstructured":"the University of Waikato Albert Bifet. 2012. Regression. (2012). http:\/\/www.cs. waikato.ac.nz\/?abifet\/523\/Regression-Slides.pdf  the University of Waikato Albert Bifet. 2012. Regression. (2012). http:\/\/www.cs. waikato.ac.nz\/?abifet\/523\/Regression-Slides.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375593"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342464"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2009.5367721"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Communication, Computing and Information Technology (ICCCMIT-2014)","author":"Lakshmi Devasena","year":"2014","unstructured":"Lakshmi Devasena C. 2014 . Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction. International Journal of Computer Applications (0975 -8887) , International Conference on Communication, Computing and Information Technology (ICCCMIT-2014) (2014). Lakshmi Devasena C. 2014. Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction. International Journal of Computer Applications (0975 -8887), International Conference on Communication, Computing and Information Technology (ICCCMIT-2014) (2014)."},{"key":"e_1_3_2_1_7_1","volume-title":"REP Tree and J48 Classifiers for Credit Risk Prediction. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014","author":"Lakshmi Devasena","year":"2015","unstructured":"Lakshmi Devasena C. 2015 . Article: Comparative Analysis of Random Forest , REP Tree and J48 Classifiers for Credit Risk Prediction. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014 , 3 (March 2015), 30--36. Full text available. Lakshmi Devasena C. 2015. Article: Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014, 3 (March 2015), 30--36. Full text available."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6953088"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/674871"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145925"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"e_1_3_2_1_12_1","first-page":"378","article-title":"REPTree and M5P for measuring fiscal policy influences on the Romanian Capital Market during 2003--2010","volume":"6","author":"G\u00f6nd\u00f6r Mihaela","year":"2012","unstructured":"Mihaela G\u00f6nd\u00f6r and Vasile Paul Bresfelean . 2012 . REPTree and M5P for measuring fiscal policy influences on the Romanian Capital Market during 2003--2010 . International Journal of Mathematics and Computers in Stimulation 6 , 4 (2012), 378 -- 386 . Mihaela G\u00f6nd\u00f6r and Vasile Paul Bresfelean. 2012. REPTree and M5P for measuring fiscal policy influences on the Romanian Capital Market during 2003--2010. International Journal of Mathematics and Computers in Stimulation 6, 4 (2012), 378--386.","journal-title":"International Journal of Mathematics and Computers in Stimulation"},{"key":"e_1_3_2_1_13_1","volume-title":"The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11, 1","author":"Hall Mark","year":"2009","unstructured":"Mark Hall , Eibe Frank , Geoffrey Holmes , Bernhard Pfahringer , Peter Reutemann , and Ian H Witten . 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11, 1 ( 2009 ), 10--18. Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H Witten. 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11, 1 (2009), 10--18."},{"key":"e_1_3_2_1_14_1","unstructured":"Tom Henderson. 2015. ns3::Log Distance Propagation Loss Model. (2015). https:\/\/www.nsnam.org\/docs\/release\/3.22\/doxygen\/classns3 1 1 log distance propagation loss model.html  Tom Henderson. 2015. ns3::Log Distance Propagation Loss Model. (2015). https:\/\/www.nsnam.org\/docs\/release\/3.22\/doxygen\/classns3 1 1 log distance propagation loss model.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Tom Henderson. 2015. ns3::Nist Error Rate Model. (2015). https:\/\/www.nsnam. org\/docs\/release\/3.22\/doxygen\/classns3 1 1 nist error rate model.html  Tom Henderson. 2015. ns3::Nist Error Rate Model. (2015). https:\/\/www.nsnam. org\/docs\/release\/3.22\/doxygen\/classns3 1 1 nist error rate model.html"},{"key":"e_1_3_2_1_16_1","first-page":"27","article-title":"Mining RoboCup Log Files to Predict Own and Opponent Action","volume":"5","author":"Karimi Maryam","year":"2014","unstructured":"Maryam Karimi and M. Ahmadzadeh . 2014 . Mining RoboCup Log Files to Predict Own and Opponent Action . International Journal of Advanced Research in Computer Science (IJARCS) 5 , 6 (2014), 27 -- 32 . Maryam Karimi and M. Ahmadzadeh. 2014. Mining RoboCup Log Files to Predict Own and Opponent Action. International Journal of Advanced Research in Computer Science (IJARCS) 5, 6 (2014), 27--32.","journal-title":"International Journal of Advanced Research in Computer Science (IJARCS)"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/7693.994819"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7390992"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/openflow.stanford.edu\/ display\/ONL\/POX+Wiki","author":"McCauley Murphy","year":"2017","unstructured":"Murphy McCauley . 2017. POX Wiki . ( 2017 ). https:\/\/openflow.stanford.edu\/ display\/ONL\/POX+Wiki Murphy McCauley. 2017. POX Wiki. (2017). https:\/\/openflow.stanford.edu\/ display\/ONL\/POX+Wiki"},{"key":"e_1_3_2_1_20_1","volume-title":"Mininet: A local area network for real-time instrumentation applications. Computer Networks (1976) 8, 2","author":"Neri G.","year":"1984","unstructured":"G. Neri , R.C.S. Morling , G.D. Cain , E. Faldella , M. Longhi-Gelati , T. Salmon-Cinotti , and P. Natali . 1984 . Mininet: A local area network for real-time instrumentation applications. Computer Networks (1976) 8, 2 (1984), 107--131. G. Neri, R.C.S. Morling, G.D. Cain, E. Faldella, M. Longhi-Gelati, T. Salmon-Cinotti, and P. Natali. 1984. Mininet: A local area network for real-time instrumentation applications. Computer Networks (1976) 8, 2 (1984), 107--131."},{"key":"e_1_3_2_1_21_1","volume-title":"Henderson","author":"Pei Guangyu","year":"2010","unstructured":"Guangyu Pei and Thomas R . Henderson . 2010 . Validation of OFDM error rate model in ns-3. Boeing Research Technology ( 2010), 1--15. Guangyu Pei and Thomas R. Henderson. 2010. Validation of OFDM error rate model in ns-3. Boeing Research Technology (2010), 1--15."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMS.2014.61"},{"key":"e_1_3_2_1_23_1","volume-title":"Quinlan et al","author":"John","year":"1992","unstructured":"John R. Quinlan et al . 1992 . Learning with continuous classes. In 5th Australian joint conference on artificial intelligence, Vol. 92 . Singapore , 343--348. John R. Quinlan et al. 1992. Learning with continuous classes. In 5th Australian joint conference on artificial intelligence, Vol. 92. Singapore, 343--348."},{"volume-title":"Engineering and Technology (ICETECH), 2015 IEEE International Conference on. IEEE, 1--4.","author":"Ramasamy Manickam","key":"e_1_3_2_1_24_1","unstructured":"Manickam Ramasamy , Shanthi Selvaraj , and M. Mayilvaganan . 2015. An empirical analysis of decision tree algorithms: Modeling hepatitis data . In Engineering and Technology (ICETECH), 2015 IEEE International Conference on. IEEE, 1--4. Manickam Ramasamy, Shanthi Selvaraj, and M. Mayilvaganan. 2015. An empirical analysis of decision tree algorithms: Modeling hepatitis data. In Engineering and Technology (ICETECH), 2015 IEEE International Conference on. IEEE, 1--4."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMI.2.4.045002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14419\/jacst.v3i2.3754"},{"key":"e_1_3_2_1_28_1","unstructured":"Salvatore Sanfilippo. 2016. hping3(8) - Linux man page. (2016). http:\/\/linux.die. net\/man\/8\/hping3  Salvatore Sanfilippo. 2016. hping3(8) - Linux man page. (2016). http:\/\/linux.die. net\/man\/8\/hping3"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Annual Technical Conference. 347--358","author":"Schulz-Zander Julius","year":"2014","unstructured":"Julius Schulz-Zander , P. Lalith Suresh , Nadi Sarrar , Anja Feldmann , Thomas H\u00fchn , and Ruben Merz . 2014 . Programmatic Orchestration of WiFi Networks .. In USENIX Annual Technical Conference. 347--358 . Julius Schulz-Zander, P. Lalith Suresh, Nadi Sarrar, Anja Feldmann, Thomas H\u00fchn, and Ruben Merz. 2014. Programmatic Orchestration of WiFi Networks.. In USENIX Annual Technical Conference. 347--358."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2015.7346672"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2050081"},{"key":"e_1_3_2_1_32_1","unstructured":"University of Michigan Z. Morley Mao. 2010. Network Service Model. (2010). http: \/\/www.eecs.umich.edu\/courses\/eecs489\/w10\/winter10\/lectures\/lecture16.pdf  University of Michigan Z. Morley Mao. 2010. Network Service Model. (2010). http: \/\/www.eecs.umich.edu\/courses\/eecs489\/w10\/winter10\/lectures\/lecture16.pdf"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2007.07.020"}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":33,"alternative-id":["10.1145\/3132114.3132125","10.1145\/3132114"],"URL":"https:\/\/doi.org\/10.1145\/3132114.3132125","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}